TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Pegasus is real. The NSO group in Israel designed an exploit that they can send to your phone number with an iPhone at least and gain full access to your phone, meaning your camera, your photos, your text messages, every single thing on your phone that you have access to and more and you will have no idea that it's on your device. It's really dangerous. And how do you prevent it? You can't. Don't use an iPhone or don't let your number get leaked. I mean, there's nothing you could do. Holy fuck. Yeah. It's considered a zero day exploit and also a zero click, meaning you don't have to interact with the phone at all.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 recounts discovering a secret SCIF on campus, a secure facility with files nobody knew existed. An employee walked by a door, inquiries were made, the room was entered, and individuals were found working there with secret files on controversial topics. Those files have been turned over to attorneys and the speaker is pursuing what happened. The speaker notes that Customs and Border Protection (CBP) knows every traveler entering the country and every good that comes in, and they assess and collect tariffs. They highlight that information about travelers during COVID was with national labs under the speaker’s jurisdiction, and that scientists at those labs participated with the Wuhan lab. The speaker claims these scientists traveled back and forth between each other and worked on those experiments, describing this as eye-opening. Addressing Elon and his team, the speaker says they were extremely helpful since the speaker’s arrival in office, assisting in identifying a troubling issue: some of the speaker’s own department employees had downloaded software on the speaker’s phone and laptop to spy on them and record meetings. The speaker states that this had happened to several politicians and notes that bringing in technology experts helped reveal this software; without examining laptops and phones, the activity would still be ongoing. The speaker emphasizes a need to continue partnering with technology companies and experts to bring them in for assistance, as government work—especially within the department under the speaker’s jurisdiction—has been neglected and lagging behind what it should be. The speaker recalls that in the first four months, they couldn’t even email a PowerPoint from Department of Homeland Security servers if it was longer than six pages, illustrating what they view as backwards thinking that hindered national security. The speaker reflects on the concept of a deep state, admitting that they previously believed it existed but didn’t realize how severe it was. They describe daily efforts to uncover individuals who do not love America and who work within the Department and across the federal government. The overall message conveys uncovering secrecy, internal surveillance concerns, cross-agency connections involving CBP and national labs, collaboration with tech experts, and a strong critique of past departmental conduct and systemic protection failures.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker recounts being swatted at his home at 2:35 AM. He saw a man with an AR-15 outside his window via security cameras. He called 911, who confirmed they received a report of a shooting, people bleeding, and people hiding at his address, none of which was true. He believes he was targeted due to his conservative political views and possibly for criticizing Zelensky and Ukraine. He notes others, including Alex Jones's reporter, have been swatted, and one InfoWars reporter was killed in Austin. He believes the goal is to scare or even kill people with opposing views. The speaker has since coordinated with the sheriff's department, who now have his and his family's contact information and a plan to verify any future calls to his address before dispatching officers. He also contacted Cash Patel, who informed the FBI director. The speaker decided to publicize the incident to raise awareness and deter future attempts.

Video Saved From X

reSee.it Video Transcript AI Summary
A speaker expresses concern about receiving a disturbing message from a stranger and emphasizes the need for education to prevent such incidents. They also mention their willingness to assist organizations combating human trafficking and sexual assault. The speaker discusses the benefits of parental monitoring apps, which allow parents to track their child's location, read their text messages, and control certain aspects of their phone usage. They highlight the alarming statistics of sexual assault among minors and stress the importance of using these apps. The concern of the interviewer is whether the apps can be easily manipulated, but the speaker believes it is currently difficult to do so. They share an example of catching someone using a fake identity online.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reveals that the NSA, the largest intelligence agency in the Biden administration, had been reading their private emails. They express shock at the government's spying and criticize the lack of outrage in Washington. The speaker shares that their emails were leaked to media outlets to portray them as a disloyal American and a Russian operative. They highlight the hypocrisy of demonizing Putin while the Chinese government gains control over the country. The speaker emphasizes that the NSA illegally unmasked them, violating the law that protects the identities of American citizens. They call for accountability from the NSA director, Paul Nakasone, and the Director of National Intelligence, April Haines. The speaker concludes by stating the importance of preventing unaccountable spy agencies from discrediting individuals through leaked emails.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses being accused of horrible things due to being Jewish and receiving messages questioning their trustworthiness as a dual Canadian-Israeli citizen. Another speaker asks if they work for an Israeli intelligence firm called Black Cube, to which the speaker denies. The conversation shifts to a specific point that the speaker didn't fully answer before abruptly ending.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states their interactions with the NSA are very limited, adding the NSA is not an agency that works with you directly. Speaker 0 mentions reading in newspapers about their phone being penetrated with Pegasus, but has no idea if it's true, stating this is the only source of information they have about themselves personally. Speaker 0 assumes by default that the devices they use are compromised and has very limited faith in platforms developed in the US from a security standpoint and privacy standpoint.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that 99% of phones worldwide are being tracked by governments through push notifications. The US government allegedly has a gag order on the two largest phone companies to keep this information hidden. Senator Ron Wyden states that foreign governments have reached out to Google and Apple for push notification data. These notifications, which appear on the screen, are sent from the app to a cloud server and then to the phone. The governments are requesting this data from Google and Apple, potentially including text information, metadata, and location details. The speaker suggests that the lack of coverage on this issue may be due to the influence of advertising and algorithms controlled by Apple and Google.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses being accused of horrible things due to being Jewish and receiving messages questioning their trustworthiness as a dual Canadian-Israeli citizen. Another speaker asks if they work for an Israeli intelligence firm called Black Cube, to which the speaker denies. The conversation shifts to a specific point that the speaker didn't fully answer before abruptly ending.

Video Saved From X

reSee.it Video Transcript AI Summary
Mexican cartels reportedly have Pegasus, the spyware used by Israel’s NSO Group to spy on Palestinians, and Mexico could use it on Americans. It can enter a phone and expose everything—calls, texts, emails, contacts, calendar, location, and app data—without the user clicking a link. It can perform a room tap using the device’s microphone and camera, deny access to sites and apps, and capture screenshots. Pegasus is described as no-click malware that pauses itself when battery drain is detected. It was developed by the Israeli firm NSO Group (not the Israeli government), and Israel’s Ministry of Defense must sign off on each sale. NSO has marketed it to Mexico and the UAE, with potential expansion to Europe and the Middle East; the cost is about 500,000 per install for iPhone and Android. A 2017 journalist killing and three Mexican agencies’ involvement were reported; it’s difficult to defend against since you don’t need to click.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2012, the speaker's property was raided by the government, resulting in the destruction of their belongings and the shooting of their dog. Angry about this, the speaker donated laptops with spyware to government secretaries. This allowed them to gain control over the entire government computer system. While monitoring the system, the speaker discovered that the Minister of National Defense was involved in drug trafficking and the Minister of Immigration was involved in human trafficking. The speaker concludes by stating that they don't want to be killed by these individuals.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims the CIA produces vast amounts of malware and viruses, subverts supply chains and antivirus software, and targets cars, smart TVs, and iPhones. After this reveal, CIA Director Pompeo allegedly launched a campaign of retribution. The speaker states that under Pompeo's direction, the CIA planned to kidnap and assassinate him within the Ecuadorian Embassy in London and targeted his European colleagues with theft, hacking attacks, and false information. His wife and infant son were also allegedly targeted, with a CIA asset assigned to track his wife and instructions given to obtain DNA from his 6-month-old son's diaper. The speaker asserts this information comes from over 30 current and former U.S. Intelligence officials speaking to the U.S. Press, corroborated by records seized in a prosecution against CIA agents. The speaker believes the CIA's actions provide insight into transnational repression, made uniquely visible due to whistleblowers and judicial investigations in Spain.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker shares their experience of being targeted by the government after their property was raided and their dog was shot. In response, they donated laptops with spyware to government secretaries, gaining control over the entire government computer system. While monitoring the system, they discovered that the minister of national defense was involved in drug trafficking and the minister of immigration was involved in human trafficking. The speaker acknowledges the risk of sharing this information and suggests that it is better to remain unaware.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus spyware, developed by an Israeli firm called the NSO Group, can get into your phone even if you don't click. It's called no click malware because you don't have to click a a link to get it, and it can detect when it's draining your battery and then pause itself so you don't know that it's there. Mexican cartels have the spyware that the Israeli government uses to spy on Palestinians, and now Mexico can use it on Americans. It can get into your phone, see everything you do, and do what's called a room tap, gather sounds and snapshots in and around the room using the phone's microphone and video camera. It can deny targets access to certain websites and applications and grab screenshots off their phone. It captures calls, texts, emails, contacts, calendar, location, Facebook, WhatsApp, and Skype. It costs 500,000 per install for iPhones and Androids.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a scenario where banks go offline, digital money disappears, and electromagnetic pulse bombs are used to attack major grids. They mention the possibility of a terrorist attack, Russian involvement, or a simulated alien invasion. The speaker believes it's important to talk about these potential threats, despite being labeled fearmongering. They argue that not discussing these possibilities would be irresponsible.

Video Saved From X

reSee.it Video Transcript AI Summary
Pegasus is spyware that can bypass phone security with a single text and grant full device access, including messages, photos, videos, emails, microphone, camera, screen, and GPS, often without detection. It infects both iOS and Android, exploiting zero-day vulnerabilities and remaining virtually undetectable. Pegasus is the main product of NSO Group, an Israeli surveillance company, and government clients worldwide use it. A Guardian investigation reveals widespread abuse by NSO's government clients, based on tens of thousands of records listing potential targets. Not every number indicates a hack, but forensic checks have found traces of attempted or successful Pegasus infections in dozens of cases. The investigation challenges the notion that Pegasus is solely a law enforcement tool. The implications are an end to privacy for the targeted and threaten democracy by empowering regimes to monitor populations.

Video Saved From X

reSee.it Video Transcript AI Summary
I want to show you something. I was going to let this go, but I can't. Hello. I don't know how to do this, but I want to tell you all that I have been pressured by government officials to do and say things to harm others. They even hacked my phone and I received a tracking notification. This happened after meeting with government officials who, besides that, offered me everything and a large sum of money. They also tried to persuade me to lie and arrange a meeting with the president if I caused harm.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there is no security whatsoever and that cybersecurity professionals face this problem daily. They state that while people are watching their phones, their phones are watching them. The operating system is designed to watch and listen to users, to know who their friends are, what is being said in text messages, and to listen at times. They claim that, although people look at their phones and it has many facilities, it is the world’s greatest spy device, designed as a spy device. Now, this.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that Telegram receives excessive attention from US security agencies. During a US visit, an engineer working for Telegram was allegedly approached by cybersecurity agents attempting a secret hire. The agents were interested in Telegram's open-source libraries and tried persuading the engineer to integrate specific open-source tools that the speaker believes would function as backdoors, potentially enabling government surveillance of Telegram users. The speaker also recounts personal experiences of being met by FBI agents at US airports and visited at their residence. They believe the FBI's interest was in gathering details about Telegram and establishing a relationship to better control the platform. While acknowledging the agents were doing their job, the speaker suggests this level of scrutiny made the US a less-than-ideal environment for running a privacy-focused social media platform.

Video Saved From X

reSee.it Video Transcript AI Summary
I was surprised to learn that someone had hacked into my Signal account. It turns out it was the NSA, as they admitted it when they contacted me. They knew about my plans to visit Putin, which I hadn't shared with anyone, not even my family. When I asked how they knew, they explained that they had accessed my text messages with the person I was communicating with. I was shocked by this invasion of privacy.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses two shooters, one with three cell phones and the other with six. The FBI hasn't opened the three phones, and the three apps on the other shooter's phone are foreign-based and also unopened. The speaker claims Iran may have a hit out on him. The speaker questions why the phones haven't been opened, especially given that J6 people's phones were opened quickly. He believes the failure to open the phones is dangerous, especially considering the assassination attempt on a former president. He notes that having six cell phones is unusual. The speaker says Apple can usually open phones but hasn't in this case, which he believes is why drug lords use Apple phones. He thinks the rules should be different when it comes to national security and the assassination attempt of a president. He suggests punishing Apple or finding someone who can open the phones to determine who the shooter was contacting.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that Telegram receives excessive attention from US security agencies. During a visit to the US, an engineer working for Telegram was allegedly approached by cybersecurity officers or agents who attempted to secretly hire him. The speaker believes the US government wanted to hire the engineer, not necessarily to write code or break into Telegram directly, but to learn about open-source libraries integrated into the Telegram app. The speaker alleges they tried to persuade the engineer to integrate specific open-source tools into Telegram's code, which the speaker believes would function as backdoors. These backdoors, according to the speaker, would potentially allow the US government, or any government, to spy on Telegram users.

Video Saved From X

reSee.it Video Transcript AI Summary
A spyware called Pegasus can bypass phone security, access messages, photos, videos, microphone, camera, GPS, and more without detection. It infects iOS and Android through unknown vulnerabilities. NSO Group, an Israeli company, sells Pegasus to government clients worldwide. Leaked records show widespread abuse of Pegasus for surveillance. This invasion of privacy threatens democracy by enabling oppressive regimes to control populations. The software undermines the notion of phone security and poses a significant threat to personal privacy and freedom.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the potential dangers of phone surveillance and the Pegasus software. They mention that the phone could be a portal to the CIA and criticize the lack of oversight and safeguards imposed by Congress. The speaker also highlights Israel's role in developing surveillance and AI technology. They mention instances where the Pegasus software has been used to target human rights activists and journalists. The speaker expresses concern about the tracking of digital information by foreign governments and emphasizes that the US government is equally sinister in tracking digital footprints without oversight. They caution listeners to be mindful of their online activities.

The Diary of a CEO

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!
Guests: Gavin de Becker
reSee.it Podcast Summary
The episode features a candid conversation with Gavin de Becker about high‑stakes security work, global power dynamics, and the fragility of privacy in the digital age. Gavin describes the core mission of his company as anti‑assassination, detailing threat assessment, protective coverage, and risk management for some of the world’s most influential figures. He argues that modern smartphones are endlessly vulnerable to state and nonstate actors, explaining that even with frequent software updates, no solution can guarantee confidentiality as long as powerful actors pursue access. The discussion expands beyond personal safety to consider how intelligence and blackmail can shape public behavior, influence decisions, and quietly steer politics and finance. Throughout, the host steers the conversation toward how individuals can navigate a world where information is contested, sources are questioned, and truth is often filtered or redacted. The dialogue weaves in firsthand anecdotes about famous clients and notable incidents, including allegations of intimate leverage used to control public figures, and it interrogates how media coverage—whether about Epstein, Bezos, or other luminaries—can be weaponized to create narratives that endure beyond the facts. The guests touch on the ethics and responsibilities of public life, noting that truth often competes with national security claims, and they discuss why transparency about complex, sensitive events remains controversial. The conversation then broadens to philosophical questions about reality in the age of AI: how technologies can blur lines between genuine experience and simulated content, and why intuition and human connection remain crucial for safety, trust, and meaningful interaction. As the hosts and guest explore personal stories—childhood, resilience, and the drive to serve others—they frame a pragmatic set of lessons: listen to intuition, act with integrity, and allow goals to unfold downstream rather than forcing rigid outcomes. The episode closes with reflections on small‑scale governance, subsidiarity, and the enduring value of authentic human contact in a world of rapid technological change.
View Full Interactive Feed